geli.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596
  1. /*
  2. * GRUB -- GRand Unified Bootloader
  3. * Copyright (C) 2003,2007,2010,2011 Free Software Foundation, Inc.
  4. *
  5. * GRUB is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * GRUB is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. /* This file is loosely based on FreeBSD geli implementation
  19. (but no code was directly copied). FreeBSD geli is distributed under
  20. following terms: */
  21. /*-
  22. * Copyright (c) 2005-2006 Pawel Jakub Dawidek <pjd@FreeBSD.org>
  23. * All rights reserved.
  24. *
  25. * Redistribution and use in source and binary forms, with or without
  26. * modification, are permitted provided that the following conditions
  27. * are met:
  28. * 1. Redistributions of source code must retain the above copyright
  29. * notice, this list of conditions and the following disclaimer.
  30. * 2. Redistributions in binary form must reproduce the above copyright
  31. * notice, this list of conditions and the following disclaimer in the
  32. * documentation and/or other materials provided with the distribution.
  33. *
  34. * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
  35. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  36. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  37. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
  38. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  39. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  40. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  41. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  42. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  43. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  44. * SUCH DAMAGE.
  45. */
  46. #include <grub/cryptodisk.h>
  47. #include <grub/types.h>
  48. #include <grub/misc.h>
  49. #include <grub/mm.h>
  50. #include <grub/dl.h>
  51. #include <grub/err.h>
  52. #include <grub/disk.h>
  53. #include <grub/crypto.h>
  54. #include <grub/partition.h>
  55. #include <grub/i18n.h>
  56. GRUB_MOD_LICENSE ("GPLv3+");
  57. /* Dirty trick to solve circular dependency. */
  58. #ifdef GRUB_UTIL
  59. #include <grub/util/misc.h>
  60. #undef GRUB_MD_SHA256
  61. #undef GRUB_MD_SHA512
  62. static const gcry_md_spec_t *
  63. grub_md_sha256_real (void)
  64. {
  65. const gcry_md_spec_t *ret;
  66. ret = grub_crypto_lookup_md_by_name ("sha256");
  67. if (!ret)
  68. grub_util_error ("%s", _("Couldn't load sha256"));
  69. return ret;
  70. }
  71. static const gcry_md_spec_t *
  72. grub_md_sha512_real (void)
  73. {
  74. const gcry_md_spec_t *ret;
  75. ret = grub_crypto_lookup_md_by_name ("sha512");
  76. if (!ret)
  77. grub_util_error ("%s", _("Couldn't load sha512"));
  78. return ret;
  79. }
  80. #define GRUB_MD_SHA256 grub_md_sha256_real()
  81. #define GRUB_MD_SHA512 grub_md_sha512_real()
  82. #endif
  83. struct grub_geli_key
  84. {
  85. grub_uint8_t iv_key[64];
  86. grub_uint8_t cipher_key[64];
  87. grub_uint8_t hmac[64];
  88. } GRUB_PACKED;
  89. struct grub_geli_phdr
  90. {
  91. grub_uint8_t magic[16];
  92. #define GELI_MAGIC "GEOM::ELI"
  93. grub_uint32_t version;
  94. grub_uint32_t flags;
  95. grub_uint16_t alg;
  96. grub_uint16_t keylen;
  97. grub_uint16_t unused3[5];
  98. grub_uint32_t sector_size;
  99. grub_uint8_t keys_used;
  100. grub_uint32_t niter;
  101. grub_uint8_t salt[64];
  102. struct grub_geli_key keys[2];
  103. } GRUB_PACKED;
  104. enum
  105. {
  106. GRUB_GELI_FLAGS_ONETIME = 1,
  107. GRUB_GELI_FLAGS_BOOT = 2,
  108. };
  109. /* FIXME: support version 0. */
  110. /* FIXME: support big-endian pre-version-4 volumes. */
  111. /* FIXME: support for keyfiles. */
  112. /* FIXME: support for HMAC. */
  113. const char *algorithms[] = {
  114. [0x01] = "des",
  115. [0x02] = "3des",
  116. [0x03] = "blowfish",
  117. [0x04] = "cast5",
  118. /* FIXME: 0x05 is skipjack, but we don't have it. */
  119. [0x0b] = "aes",
  120. /* FIXME: 0x10 is null. */
  121. [0x15] = "camellia128",
  122. [0x16] = "aes"
  123. };
  124. #define MAX_PASSPHRASE 256
  125. static gcry_err_code_t
  126. geli_rekey (struct grub_cryptodisk *dev, grub_uint64_t zoneno)
  127. {
  128. gcry_err_code_t gcry_err;
  129. const struct {
  130. char magic[4];
  131. grub_uint64_t zone;
  132. } GRUB_PACKED tohash
  133. = { {'e', 'k', 'e', 'y'}, grub_cpu_to_le64 (zoneno) };
  134. GRUB_PROPERLY_ALIGNED_ARRAY (key, GRUB_CRYPTO_MAX_MDLEN);
  135. if (dev->hash->mdlen > GRUB_CRYPTO_MAX_MDLEN)
  136. return GPG_ERR_INV_ARG;
  137. grub_dprintf ("geli", "rekeying %" PRIuGRUB_UINT64_T " keysize=%d\n",
  138. zoneno, dev->rekey_derived_size);
  139. gcry_err = grub_crypto_hmac_buffer (dev->hash, dev->rekey_key, 64,
  140. &tohash, sizeof (tohash), key);
  141. if (gcry_err)
  142. return gcry_err;
  143. return grub_cryptodisk_setkey (dev, (grub_uint8_t *) key,
  144. dev->rekey_derived_size);
  145. }
  146. static inline gcry_err_code_t
  147. make_uuid (const struct grub_geli_phdr *header,
  148. char *uuid)
  149. {
  150. grub_uint8_t uuidbin[GRUB_CRYPTODISK_MAX_UUID_LENGTH];
  151. gcry_err_code_t err;
  152. grub_uint8_t *iptr;
  153. char *optr;
  154. if (2 * GRUB_MD_SHA256->mdlen + 1 > GRUB_CRYPTODISK_MAX_UUID_LENGTH)
  155. return GPG_ERR_TOO_LARGE;
  156. err = grub_crypto_hmac_buffer (GRUB_MD_SHA256,
  157. header->salt, sizeof (header->salt),
  158. "uuid", sizeof ("uuid") - 1, uuidbin);
  159. if (err)
  160. return err;
  161. optr = uuid;
  162. for (iptr = uuidbin; iptr < &uuidbin[GRUB_MD_SHA256->mdlen]; iptr++)
  163. {
  164. grub_snprintf (optr, 3, "%02x", *iptr);
  165. optr += 2;
  166. }
  167. *optr = 0;
  168. return GPG_ERR_NO_ERROR;
  169. }
  170. #ifdef GRUB_UTIL
  171. #include <grub/emu/hostdisk.h>
  172. #include <grub/emu/misc.h>
  173. char *
  174. grub_util_get_geli_uuid (const char *dev)
  175. {
  176. grub_util_fd_t fd;
  177. grub_uint64_t s;
  178. unsigned log_secsize;
  179. grub_uint8_t hdr[512];
  180. struct grub_geli_phdr *header;
  181. char *uuid;
  182. gcry_err_code_t err;
  183. fd = grub_util_fd_open (dev, GRUB_UTIL_FD_O_RDONLY);
  184. if (!GRUB_UTIL_FD_IS_VALID (fd))
  185. return NULL;
  186. s = grub_util_get_fd_size (fd, dev, &log_secsize);
  187. s >>= log_secsize;
  188. if (grub_util_fd_seek (fd, (s << log_secsize) - 512) < 0)
  189. grub_util_error ("%s", _("couldn't read ELI metadata"));
  190. uuid = xmalloc (GRUB_MD_SHA256->mdlen * 2 + 1);
  191. if (grub_util_fd_read (fd, (void *) &hdr, 512) < 0)
  192. grub_util_error ("%s", _("couldn't read ELI metadata"));
  193. grub_util_fd_close (fd);
  194. COMPILE_TIME_ASSERT (sizeof (header) <= 512);
  195. header = (void *) &hdr;
  196. /* Look for GELI magic sequence. */
  197. if (grub_memcmp (header->magic, GELI_MAGIC, sizeof (GELI_MAGIC))
  198. || grub_le_to_cpu32 (header->version) > 7
  199. || grub_le_to_cpu32 (header->version) < 1)
  200. grub_util_error ("%s", _("wrong ELI magic or version"));
  201. err = make_uuid ((void *) &hdr, uuid);
  202. if (err)
  203. {
  204. grub_free (uuid);
  205. return NULL;
  206. }
  207. return uuid;
  208. }
  209. #endif
  210. static grub_cryptodisk_t
  211. configure_ciphers (grub_disk_t disk, const char *check_uuid,
  212. int boot_only)
  213. {
  214. grub_cryptodisk_t newdev;
  215. struct grub_geli_phdr header;
  216. grub_crypto_cipher_handle_t cipher = NULL, secondary_cipher = NULL;
  217. const struct gcry_cipher_spec *ciph;
  218. const char *ciphername = NULL;
  219. gcry_err_code_t gcry_err;
  220. char uuid[GRUB_CRYPTODISK_MAX_UUID_LENGTH];
  221. grub_disk_addr_t sector;
  222. grub_err_t err;
  223. if (2 * GRUB_MD_SHA256->mdlen + 1 > GRUB_CRYPTODISK_MAX_UUID_LENGTH)
  224. return NULL;
  225. sector = grub_disk_get_size (disk);
  226. if (sector == GRUB_DISK_SIZE_UNKNOWN || sector == 0)
  227. return NULL;
  228. /* Read the GELI header. */
  229. err = grub_disk_read (disk, sector - 1, 0, sizeof (header), &header);
  230. if (err)
  231. return NULL;
  232. /* Look for GELI magic sequence. */
  233. if (grub_memcmp (header.magic, GELI_MAGIC, sizeof (GELI_MAGIC))
  234. || grub_le_to_cpu32 (header.version) > 7
  235. || grub_le_to_cpu32 (header.version) < 1)
  236. {
  237. grub_dprintf ("geli", "wrong magic %02x\n", header.magic[0]);
  238. return NULL;
  239. }
  240. if ((grub_le_to_cpu32 (header.sector_size)
  241. & (grub_le_to_cpu32 (header.sector_size) - 1))
  242. || grub_le_to_cpu32 (header.sector_size) == 0)
  243. {
  244. grub_dprintf ("geli", "incorrect sector size %d\n",
  245. grub_le_to_cpu32 (header.sector_size));
  246. return NULL;
  247. }
  248. if (grub_le_to_cpu32 (header.flags) & GRUB_GELI_FLAGS_ONETIME)
  249. {
  250. grub_dprintf ("geli", "skipping one-time volume\n");
  251. return NULL;
  252. }
  253. if (boot_only && !(grub_le_to_cpu32 (header.flags) & GRUB_GELI_FLAGS_BOOT))
  254. {
  255. grub_dprintf ("geli", "not a boot volume\n");
  256. return NULL;
  257. }
  258. gcry_err = make_uuid (&header, uuid);
  259. if (gcry_err)
  260. {
  261. grub_crypto_gcry_error (gcry_err);
  262. return NULL;
  263. }
  264. if (check_uuid && grub_strcasecmp (check_uuid, uuid) != 0)
  265. {
  266. grub_dprintf ("geli", "%s != %s\n", uuid, check_uuid);
  267. return NULL;
  268. }
  269. if (grub_le_to_cpu16 (header.alg) >= ARRAY_SIZE (algorithms)
  270. || algorithms[grub_le_to_cpu16 (header.alg)] == NULL)
  271. {
  272. grub_error (GRUB_ERR_FILE_NOT_FOUND, "Cipher 0x%x unknown",
  273. grub_le_to_cpu16 (header.alg));
  274. return NULL;
  275. }
  276. ciphername = algorithms[grub_le_to_cpu16 (header.alg)];
  277. ciph = grub_crypto_lookup_cipher_by_name (ciphername);
  278. if (!ciph)
  279. {
  280. grub_error (GRUB_ERR_FILE_NOT_FOUND, "Cipher %s isn't available",
  281. ciphername);
  282. return NULL;
  283. }
  284. /* Configure the cipher used for the bulk data. */
  285. cipher = grub_crypto_cipher_open (ciph);
  286. if (!cipher)
  287. return NULL;
  288. if (grub_le_to_cpu16 (header.alg) == 0x16)
  289. {
  290. secondary_cipher = grub_crypto_cipher_open (ciph);
  291. if (!secondary_cipher)
  292. {
  293. grub_crypto_cipher_close (cipher);
  294. return NULL;
  295. }
  296. }
  297. if (grub_le_to_cpu16 (header.keylen) > 1024)
  298. {
  299. grub_error (GRUB_ERR_BAD_ARGUMENT, "invalid keysize %d",
  300. grub_le_to_cpu16 (header.keylen));
  301. grub_crypto_cipher_close (cipher);
  302. grub_crypto_cipher_close (secondary_cipher);
  303. return NULL;
  304. }
  305. newdev = grub_zalloc (sizeof (struct grub_cryptodisk));
  306. if (!newdev)
  307. {
  308. grub_crypto_cipher_close (cipher);
  309. grub_crypto_cipher_close (secondary_cipher);
  310. return NULL;
  311. }
  312. newdev->cipher = cipher;
  313. newdev->secondary_cipher = secondary_cipher;
  314. newdev->offset = 0;
  315. newdev->source_disk = NULL;
  316. newdev->benbi_log = 0;
  317. if (grub_le_to_cpu16 (header.alg) == 0x16)
  318. {
  319. newdev->mode = GRUB_CRYPTODISK_MODE_XTS;
  320. newdev->mode_iv = GRUB_CRYPTODISK_MODE_IV_BYTECOUNT64;
  321. }
  322. else
  323. {
  324. newdev->mode = GRUB_CRYPTODISK_MODE_CBC;
  325. newdev->mode_iv = GRUB_CRYPTODISK_MODE_IV_BYTECOUNT64_HASH;
  326. }
  327. newdev->essiv_cipher = NULL;
  328. newdev->essiv_hash = NULL;
  329. newdev->hash = GRUB_MD_SHA512;
  330. newdev->iv_hash = GRUB_MD_SHA256;
  331. for (newdev->log_sector_size = 0;
  332. (1U << newdev->log_sector_size) < grub_le_to_cpu32 (header.sector_size);
  333. newdev->log_sector_size++);
  334. if (grub_le_to_cpu32 (header.version) >= 5)
  335. {
  336. newdev->rekey = geli_rekey;
  337. newdev->rekey_shift = 20;
  338. }
  339. newdev->modname = "geli";
  340. newdev->total_length = grub_disk_get_size (disk) - 1;
  341. grub_memcpy (newdev->uuid, uuid, sizeof (newdev->uuid));
  342. COMPILE_TIME_ASSERT (sizeof (newdev->uuid) >= 32 * 2 + 1);
  343. return newdev;
  344. }
  345. static grub_err_t
  346. recover_key (grub_disk_t source, grub_cryptodisk_t dev)
  347. {
  348. grub_size_t keysize;
  349. grub_uint8_t digest[GRUB_CRYPTO_MAX_MDLEN];
  350. grub_uint8_t geomkey[GRUB_CRYPTO_MAX_MDLEN];
  351. grub_uint8_t verify_key[GRUB_CRYPTO_MAX_MDLEN];
  352. grub_uint8_t zero[GRUB_CRYPTO_MAX_CIPHER_BLOCKSIZE];
  353. grub_uint8_t geli_cipher_key[64];
  354. char passphrase[MAX_PASSPHRASE] = "";
  355. unsigned i;
  356. gcry_err_code_t gcry_err;
  357. struct grub_geli_phdr header;
  358. char *tmp;
  359. grub_disk_addr_t sector;
  360. grub_err_t err;
  361. if (dev->cipher->cipher->blocksize > GRUB_CRYPTO_MAX_CIPHER_BLOCKSIZE)
  362. return grub_error (GRUB_ERR_BUG, "cipher block is too long");
  363. if (dev->hash->mdlen > GRUB_CRYPTO_MAX_MDLEN)
  364. return grub_error (GRUB_ERR_BUG, "mdlen is too long");
  365. sector = grub_disk_get_size (source);
  366. if (sector == GRUB_DISK_SIZE_UNKNOWN || sector == 0)
  367. return grub_error (GRUB_ERR_BUG, "not a geli");
  368. /* Read the GELI header. */
  369. err = grub_disk_read (source, sector - 1, 0, sizeof (header), &header);
  370. if (err)
  371. return err;
  372. keysize = grub_le_to_cpu16 (header.keylen) / GRUB_CHAR_BIT;
  373. grub_memset (zero, 0, sizeof (zero));
  374. grub_puts_ (N_("Attempting to decrypt master key..."));
  375. /* Get the passphrase from the user. */
  376. tmp = NULL;
  377. if (source->partition)
  378. tmp = grub_partition_get_name (source->partition);
  379. grub_printf_ (N_("Enter passphrase for %s%s%s (%s): "), source->name,
  380. source->partition ? "," : "", tmp ? : "",
  381. dev->uuid);
  382. grub_free (tmp);
  383. if (!grub_password_get (passphrase, MAX_PASSPHRASE))
  384. return grub_error (GRUB_ERR_BAD_ARGUMENT, "Passphrase not supplied");
  385. /* Calculate the PBKDF2 of the user supplied passphrase. */
  386. if (grub_le_to_cpu32 (header.niter) != 0)
  387. {
  388. grub_uint8_t pbkdf_key[64];
  389. gcry_err = grub_crypto_pbkdf2 (dev->hash, (grub_uint8_t *) passphrase,
  390. grub_strlen (passphrase),
  391. header.salt,
  392. sizeof (header.salt),
  393. grub_le_to_cpu32 (header.niter),
  394. pbkdf_key, sizeof (pbkdf_key));
  395. if (gcry_err)
  396. return grub_crypto_gcry_error (gcry_err);
  397. gcry_err = grub_crypto_hmac_buffer (dev->hash, NULL, 0, pbkdf_key,
  398. sizeof (pbkdf_key), geomkey);
  399. if (gcry_err)
  400. return grub_crypto_gcry_error (gcry_err);
  401. }
  402. else
  403. {
  404. struct grub_crypto_hmac_handle *hnd;
  405. hnd = grub_crypto_hmac_init (dev->hash, NULL, 0);
  406. if (!hnd)
  407. return grub_crypto_gcry_error (GPG_ERR_OUT_OF_MEMORY);
  408. grub_crypto_hmac_write (hnd, header.salt, sizeof (header.salt));
  409. grub_crypto_hmac_write (hnd, passphrase, grub_strlen (passphrase));
  410. gcry_err = grub_crypto_hmac_fini (hnd, geomkey);
  411. if (gcry_err)
  412. return grub_crypto_gcry_error (gcry_err);
  413. }
  414. gcry_err = grub_crypto_hmac_buffer (dev->hash, geomkey,
  415. dev->hash->mdlen, "\1", 1, digest);
  416. if (gcry_err)
  417. return grub_crypto_gcry_error (gcry_err);
  418. gcry_err = grub_crypto_hmac_buffer (dev->hash, geomkey,
  419. dev->hash->mdlen, "\0", 1, verify_key);
  420. if (gcry_err)
  421. return grub_crypto_gcry_error (gcry_err);
  422. grub_dprintf ("geli", "keylen = %" PRIuGRUB_SIZE "\n", keysize);
  423. /* Try to recover master key from each active keyslot. */
  424. for (i = 0; i < ARRAY_SIZE (header.keys); i++)
  425. {
  426. struct grub_geli_key candidate_key;
  427. grub_uint8_t key_hmac[GRUB_CRYPTO_MAX_MDLEN];
  428. /* Check if keyslot is enabled. */
  429. if (! (header.keys_used & (1 << i)))
  430. continue;
  431. grub_dprintf ("geli", "Trying keyslot %d\n", i);
  432. gcry_err = grub_crypto_cipher_set_key (dev->cipher,
  433. digest, keysize);
  434. if (gcry_err)
  435. return grub_crypto_gcry_error (gcry_err);
  436. gcry_err = grub_crypto_cbc_decrypt (dev->cipher, &candidate_key,
  437. &header.keys[i],
  438. sizeof (candidate_key),
  439. zero);
  440. if (gcry_err)
  441. return grub_crypto_gcry_error (gcry_err);
  442. gcry_err = grub_crypto_hmac_buffer (dev->hash, verify_key,
  443. dev->hash->mdlen,
  444. &candidate_key,
  445. (sizeof (candidate_key)
  446. - sizeof (candidate_key.hmac)),
  447. key_hmac);
  448. if (gcry_err)
  449. return grub_crypto_gcry_error (gcry_err);
  450. if (grub_memcmp (candidate_key.hmac, key_hmac, dev->hash->mdlen) != 0)
  451. continue;
  452. grub_printf_ (N_("Slot %d opened\n"), i);
  453. if (grub_le_to_cpu32 (header.version) >= 7)
  454. {
  455. /* GELI >=7 uses the cipher_key */
  456. grub_memcpy (geli_cipher_key, candidate_key.cipher_key,
  457. sizeof (candidate_key.cipher_key));
  458. }
  459. else
  460. {
  461. /* GELI <=6 uses the iv_key */
  462. grub_memcpy (geli_cipher_key, candidate_key.iv_key,
  463. sizeof (candidate_key.iv_key));
  464. }
  465. /* Set the master key. */
  466. if (!dev->rekey)
  467. {
  468. grub_size_t real_keysize = keysize;
  469. if (grub_le_to_cpu16 (header.alg) == 0x16)
  470. real_keysize *= 2;
  471. gcry_err = grub_cryptodisk_setkey (dev, candidate_key.cipher_key,
  472. real_keysize);
  473. if (gcry_err)
  474. return grub_crypto_gcry_error (gcry_err);
  475. }
  476. else
  477. {
  478. grub_size_t real_keysize = keysize;
  479. if (grub_le_to_cpu16 (header.alg) == 0x16)
  480. real_keysize *= 2;
  481. grub_memcpy (dev->rekey_key, geli_cipher_key,
  482. sizeof (geli_cipher_key));
  483. dev->rekey_derived_size = real_keysize;
  484. dev->last_rekey = -1;
  485. COMPILE_TIME_ASSERT (sizeof (dev->rekey_key)
  486. >= sizeof (geli_cipher_key));
  487. }
  488. dev->iv_prefix_len = sizeof (candidate_key.iv_key);
  489. grub_memcpy (dev->iv_prefix, candidate_key.iv_key,
  490. sizeof (candidate_key.iv_key));
  491. COMPILE_TIME_ASSERT (sizeof (dev->iv_prefix) >= sizeof (candidate_key.iv_key));
  492. return GRUB_ERR_NONE;
  493. }
  494. return GRUB_ACCESS_DENIED;
  495. }
  496. struct grub_cryptodisk_dev geli_crypto = {
  497. .scan = configure_ciphers,
  498. .recover_key = recover_key
  499. };
  500. GRUB_MOD_INIT (geli)
  501. {
  502. grub_cryptodisk_dev_register (&geli_crypto);
  503. }
  504. GRUB_MOD_FINI (geli)
  505. {
  506. grub_cryptodisk_dev_unregister (&geli_crypto);
  507. }